scholarly journals Blockchain-enable Contact Tracing for Preserving User Privacy During COVID-19 Outbreak

Author(s):  
Md. Murshedul Arifeen ◽  
Abdullah Al Mamun ◽  
M Shamim Kaiser ◽  
Mufti Mahmud

Contact tracing has become an indispensable tool of various extensive measures to control the spread of COVID-19 pandemic due to novel coronavirus. This essential tool helps to identify, isolate and quarantine the contacted persons of a COVID-19 patient. However, the existing contact tracing applications developed by various countries, health organizations to trace down the contacts after identifying a COVID-19 patient suffers from several security and privacy concerns. In this work, we have identified those security and privacy issues of several leading contact tracing applications and proposed a blockchain-based framework to overcome the major security and privacy challenges imposed by the applications. We have discussed the security and privacy measures that are achieved by the proposed framework to show the effectiveness against the security and privacy issues raised by the existing mobile contact tracing applications.

Author(s):  
D. N. Kartheek ◽  
Bharath Bhushan

The inherent features of internet of things (IoT) devices, like limited computational power and storage, lead to a novel platform to efficiently process data. Fog computing came into picture to bridge the gap between IoT devices and data centres. The main purpose of fog computing is to speed up the computing processing. Cloud computing is not feasible for many IoT applications; therefore, fog computing is a perfect alternative. Fog computing is suitable for many IoT services as it has many extensive benefits such as reduced latency, decreased bandwidth, and enhanced security. However, the characteristics of fog raise new security and privacy issues. The existing security and privacy measures of cloud computing cannot be directly applied to fog computing. This chapter gives an overview of current security and privacy concerns, especially for the fog computing. This survey mainly focuses on ongoing research, security challenges, and trends in security and privacy issues for fog computing.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 928 ◽  
Author(s):  
Mahdi Daghmehchi Firoozjaei ◽  
Ali Ghorbani ◽  
Hyoungshick Kim ◽  
JaeSeung Song

In the current centralized IoT ecosystems, all financial transactions are routed through IoT platform providers. The security and privacy issues are inevitable with an untrusted or compromised IoT platform provider. To address these issues, we propose Hy-Bridge, a hybrid blockchain-based billing and charging framework. In Hy-Bridge, the IoT platform provider plays no proxy role, and IoT users can securely and efficiently share a credit with other users. The trustful end-to-end functionality of blockchain helps us to provide accountability and reliability features in IoT transactions. Furthermore, with the blockchain-distributed consensus, we provide a credit-sharing feature for IoT users in the energy and utility market. To provide this feature, we introduce a local block framework for service management in the credit-sharing group. To preserve the IoT users’ privacy and avoid any information leakage to the main blockchain, an interconnection position, called bridge, is introduced to isolate IoT users’ peer-to-peer transactions and link the main blockchain to its subnetwork blockchain(s) in a hybrid model. To this end, a k-anonymity protection is performed on the bridge. To evaluate the performance of the introduced hybrid blockchain-based billing and charging, we simulated the energy use case scenario using Hy-Bridge. Our simulation results show that Hy-Bridge could protect user privacy with an acceptable level of information loss and CPU and memory usage.


2021 ◽  
Vol 8 (5) ◽  
pp. 73-83
Author(s):  
Ibrahim A. Atoum ◽  
◽  
Ismail M. Keshta ◽  

Big data has been used by different companies to deliver simple products and provide enhanced customer insights through predictive technology such as artificial intelligence. Big data is a field that mainly deals with the extraction and systemic analysis of large data sets to help businesses discover trends. Today, many companies use Big Data to facilitate growth in different functional areas as well as expand their ability to handle large customer databases. Big data has grown the demand for information management experts such that many software companies are increasingly investing in firms that specialize in data management and analytics. Nevertheless, the issue of data protection or privacy is a threat to big data management. This article presents some of the major concerns surrounding the application and use of Big Data about challenges of security and privacy of data stored on technological devices. The paper also discusses some of the current studies being undertaken aimed at addressing security and privacy issues in Big Data.


2016 ◽  
pp. 379-402 ◽  
Author(s):  
Scott Amyx

This chapter identifies concerns about, and the managerial implications of, data privacy issues related to wearables and the IoT; it also offers some enterprise solutions to the complex concerns arising from the aggregation of the massive amounts of data derived from wearables and IoT devices. Consumer and employee privacy concerns are elucidated, as are the problems facing managers as data management and security become an important part of business operations. The author provides insight into how companies are currently managing data as well as some issues related to data security and privacy. A number of suggestions for improving the approach to data protection and addressing concerns about privacy are included. This chapter also examines trending issues in the areas of data protection and the IoT, and contains thought-provoking discussion questions pertaining to business, wearables/IoT data, and privacy issues.


2016 ◽  
Vol 14 (4) ◽  
pp. 364-382 ◽  
Author(s):  
Aqdas Malik ◽  
Kari Hiekkanen ◽  
Amandeep Dhir ◽  
Marko Nieminen

Purpose The popularity of Facebook photo sharing has not only seen a surge in the number of photos shared but also has raised various issues concerning user privacy and self-disclosure. Recent literature has documented the increasing interest of the research community in understanding various privacy issues concerning self-disclosures on Facebook. However, little is known about how different privacy issues, trust and activity influence users’ intentions to share photos on Facebook. To bridge this gap, a research model was developed and tested to better understand the impact of privacy concerns, privacy awareness and privacy-seeking on trust and actual photo sharing activity and subsequently on photo sharing intentions. This study aims to examine the consequences of various facets of privacy associated with photo sharing activity on Facebook. Design/methodology/approach A cross-sectional data from 378 respondents were collected and analysed using partial least squares modelling. Findings The results revealed a significant relationship between various aspects of privacy, including awareness and protective behaviour, with trust and activity. Furthermore, trust and users’ photo sharing activity significantly impact photo sharing intentions on Facebook. Originality/value This study contributes new knowledge concerning various privacy issues and their impact on photo sharing activity and trust. The study also proposes implications that are highly relevant for social networking sites, media agencies and organisations involved in safeguarding the privacy of online users.


2021 ◽  
Author(s):  
Paul Michael Garrett ◽  
Yu Wen Wang ◽  
Joshua Paul White ◽  
Yoshihisa Kashima ◽  
Simon Dennis ◽  
...  

Taiwan has been a world leader in controlling the spread of SARS-CoV-2 during the COVID-19 pandemic. Recently, the Taiwan Government launched its COVID-19 tracing App the `Taiwan Social Distancing App', however the effectiveness of this tracing App depends on its acceptance and uptake among the general population. We measured acceptance for three hypothetical tracing technologies (telecommunication network tracing, a government App, and the Apple and Google Bluetooth exposure notification system) in four nationally representative Taiwanese samples. Using Bayesian methods, we find high acceptance for all three tracking technologies, with acceptance increasing with the inclusion of additional privacy measures. Modelling revealed acceptance increased with the perceived technology benefits, trust in the providers' intent, data security and privacy measures, the level of ongoing control, and one's level of education. Acceptance decreased with data sensitivity perceptions, and perceived low policy compliance by others in the general public. We consider the policy implications of these results for Taiwan during the COVID-19 pandemic and into the future.


2019 ◽  
Vol 10 (2) ◽  
pp. 6-19
Author(s):  
Cinthia Obladen De Almendra Freitas ◽  
Giovanna Michelato Almada

The development of new technologies often arouses discussions concerning privacy rights. Consequently, when the Internet became popular and worldwide spread, user privacy concerns also began to arise. Therefore, with the emergence of the information society, the notion of user privacy became variable and has changed over time and according to the region. Consequently, its concept has been modified over the decades too. In 1890, privacy was defined as the right to be left alone. As time passed, the idea of privacy has changed and has become more and more multifaceted, as a reflection of intrinsic aspects of the society. Even with the volatility of this concept, privacy is a fundamental right, as well as essential for a citizen to use the Internet properly. Although it is a fundamental right, people tend to give up on their privacy because of functionalities on the Internet or exchange it for small rewards. However, users often do not have the knowledge about the exchanges or violations. In order to solve some of the Internet data privacy issues, Libertarian Paternalism may be used. Different researches were conducted by applying this theory in the data privacy sphere. By using nudges, it is possible to help people choose wisely how to protect privacy, or at least to give them the right amount of information and guide users to the best option.


Author(s):  
Scott Amyx

This chapter identifies concerns about, and the managerial implications of, data privacy issues related to wearables and the IoT; it also offers some enterprise solutions to the complex concerns arising from the aggregation of the massive amounts of data derived from wearables and IoT devices. Consumer and employee privacy concerns are elucidated, as are the problems facing managers as data management and security become an important part of business operations. The author provides insight into how companies are currently managing data as well as some issues related to data security and privacy. A number of suggestions for improving the approach to data protection and addressing concerns about privacy are included. This chapter also examines trending issues in the areas of data protection and the IoT, and contains thought-provoking discussion questions pertaining to business, wearables/IoT data, and privacy issues.


2018 ◽  
Vol 2018 ◽  
pp. 1-27 ◽  
Author(s):  
Emanuel Ferreira Jesus ◽  
Vanessa R. L. Chicarino ◽  
Célio V. N. de Albuquerque ◽  
Antônio A. de A. Rocha

The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain.


Sign in / Sign up

Export Citation Format

Share Document